Hackers exploit a 3-Year-Old Flaw to Breach a U.S. Federal Agency

Hackers exploit a 3-Year-Old Flaw to Breach a U.S. Federal Agency

Hackers exploit a 3-Year-Old Flaw to Breach a U.S. Federal Agency Recent reports claim that several hacker groups breached a U.S. federal agency using a three-year-old vulnerability. The breach exposed sensitive data, including private and secret government information. The issue in question relates to a piece of software(Telerik UI flaw) that is frequently used by […]

Cybersecurity in the era of Remote Work

Cybersecurity in the era of Remote Work

Cybersecurity in the era of Remote Work With the COVID-19 pandemic forcing many organizations to adopt remote work, the importance of cybersecurity has only increased. As employees access company data and networks from their homes or other remote locations, the risk of cyberattacks has also increased. In this article, we will explore some of the […]

New Cryptojacking Targeting Kubernetes Clusters for Dero Mining

New Cryptojacking Targeting Kubernetes Clusters for Dero Mining

New Cryptojacking Targeting Kubernetes Clusters for Dero Mining From the beginning of February 2023, cybersecurity experts have uncovered the first-ever illegal cryptocurrency mining operation used to produce Dero. According to CrowdStrike, the innovative Dero cryptojacking operation focuses on finding Kubernetes clusters that have anonymous access enabled on a Kubernetes API and are listening on non-standard […]

CISA identifies Adobe ColdFusion Vulnerability exploited globally

CISA identifies Adobe ColdFusion Vulnerability exploited globally

CISA identifies Adobe ColdFusion Vulnerability exploited globally Based on the evidence of active exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Adobe ColdFusion security vulnerability to its Known Exploited Vulnerabilities (KEV) list on March 15. CVE-2023-26360 (CVSS score: 8.6) is the significant weakness in question, which a threat actor might use to […]